Sciweavers

3528 search results - page 608 / 706
» A New Approach to Planning in Networks
Sort
View
CCS
2010
ACM
14 years 10 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
COMCOM
2006
120views more  COMCOM 2006»
14 years 10 months ago
On the impact of loss and delay variation on Internet packet audio transmission
The quality of audio in IP telephony is significantly influenced by various factors, including type of encoder, delay, delay variation, rate and distribution of packet loss, and t...
Lopamudra Roychoudhuri, Ehab S. Al-Shaer, Gregory ...
COMPUTER
1999
108views more  COMPUTER 1999»
14 years 9 months ago
Distance Visualization: Data Exploration on the Grid
Scientific visualization has emerged as an important tool for extracting meaning from the large volumes of data produced by scientific instruments and simulations. Increasingly, t...
Ian T. Foster, Joseph A. Insley, Gregor von Laszew...
IFM
2009
Springer
107views Formal Methods» more  IFM 2009»
15 years 4 months ago
Realizability of Choreographies Using Process Algebra Encodings
Abstract. Service-oriented computing has emerged as a new programming paradigm that aims at implementing software applications which can be used through a network via the exchange ...
Gwen Salaün, Tevfik Bultan
MM
2005
ACM
93views Multimedia» more  MM 2005»
15 years 3 months ago
The multimedia challenges raised by pervasive games
Pervasive gaming is a new form of multimedia entertainment that extends the traditional computer gaming experience out into the real world. Through a combination of personal devic...
Mauricio Capra, Milena Radenkovic, Steve Benford, ...